A ransomware attack against a vendor of a fund administrator exposed data of investors. We analyze how a TPRM program can help prevent a Third-Party Data Breach like this.
We look at the latest DBIR through the lens of third-party risk and how it relates to the 43% of breaches that involve web applications.
We explore the benefits of having risk management operations planned, built, and run as a service, through the combination of a purpose-built tool with technical expertise.
In Utilities, there’s a saying that “Safety is everybody’s business”. At some level, cybersecurity is becoming a part of everyone’s job too.
A consistent scoring system for quantifying your TPRM program will improve decision-making, enhance visibility, and demonstrate the value of your strategy.
As of October 1st, 2020 energy organizations will have to focus on addressing specific third-party cybersecurity risks. This blog looks at some key points of the standard and how TPRM technology can help complyi.
Here are five common mistakes to avoid along with our tips for building the TPRM program in a way that best serves your organization and the people who work within it.
Tone at the top is critical. Here are seven tips for obtaining and maintaining the support you need from the C-suite
It’s hard to set expectations and discuss findings via email. Here’s how to improve communication with third-parties for a successful TPRM program.
The OWASP Top 10 is a good starting point for detecting possible issues around third-party components. So how does it relate to TPRM?